<--- Back to Details
First PageDocument Content
MIPS architecture / Ring / Instruction set / Capability-based security / 64-bit / Hypervisor / Kernel / Reduced instruction set computing / Memory protection / Computer architecture / Central processing unit / Instruction set architectures
Date: 2015-01-15 09:17:36
MIPS architecture
Ring
Instruction set
Capability-based security
64-bit
Hypervisor
Kernel
Reduced instruction set computing
Memory protection
Computer architecture
Central processing unit
Instruction set architectures

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 682,43 KB

Share Document on Facebook

Similar Documents

Computer security / Computer hardware / Side-channel attacks / X86 architecture / Computing / Meltdown / Computer engineering / Pwnie Awards

Meltdown Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6 , Yuval Yarom

DocID: 1xVgv - View Document

System software / Computer architecture / Software / Kernel / Xv6 / LLVM / Linux kernel

Hyperkernel: Push-Button Verification of an OS Kernel

DocID: 1xVeg - View Document

Computer architecture / Computing / Formal methods / Logic in computer science / Kernel / Linux kernel / L4 microkernel family / Mach / Verification / X86-64 / Formal verification / Satisfiability modulo theories

Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, and Xi Wang University of Washington {lukenels,helgi,kaiyuanz,dgj16,bo

DocID: 1xUUc - View Document

Computer architecture / Computing / Computer hardware / Central processing unit / X86 architecture / Computer memory / Side-channel attacks / Virtual memory / Translation lookaside buffer / CPU cache / Meltdown / Spectre

Meltdown: Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Ya

DocID: 1xU6r - View Document

PDF Document

DocID: 1xPhq - View Document